Proceedings of the 43rd annual Design Automation Conference
On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function
Journal of VLSI Signal Processing Systems
Exploring software partitions for fast security processing on a multiprocessor mobile SoC
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class
Journal of Signal Processing Systems
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Information Security and Cryptology
Hardware authentication leveraging performance limits in detailed simulations and emulations
Proceedings of the 46th Annual Design Automation Conference
On designing fast nonuniformly distributed IP address lookup hashing algorithms
IEEE/ACM Transactions on Networking (TON)
WISA'07 Proceedings of the 8th international conference on Information security applications
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hardware architecture and cost estimates for breaking SHA-1
ISC'05 Proceedings of the 8th international conference on Information Security
Secure JTAG Implementation Using Schnorr Protocol
Journal of Electronic Testing: Theory and Applications
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by using a 0.13-µm CMOS standard cell library with two synthesis options, area and speed optimizations, and their performances were evaluated. The smallest circuit of 8.0 Kgates with a throughput of 929 Mbps, and the highest throughput of 2.9 Gbps with 27.3 Kgates were obtained for SHA-1 and SHA-384/512 respectively. In terms of overall performance with consideration of the security levels, we conclude that SHA-256 is the best algorithm, with compact circuits of 11.5~15.3 Kgates and high throughputs of 1.1 ~ 2.4 Gbps. Our implementations also showed the highest throughputs for all of the hash functions in comparison with the state of the art.